![D-Link DGS-3700 Series Reference Manual Download Page 4](http://html.mh-extra.com/html/d-link/dgs-3700-series/dgs-3700-series_reference-manual_76575004.webp)
DGS-3700 Series Layer 2 Managed Gigabit Ethernet Switch CLI Reference Guide
Page | 4
Loop-back Detection Commands .............................................................................................................................................. 334
Out-of-Band Managemnet Commands ..................................................................................................................................... 338
Routing Table Commands ......................................................................................................................................................... 340
Quality of Service (QoS) Section ................................................................................................................ 344
QoS Commands ........................................................................................................................................................................ 344
Simple RED Commands ........................................................................................................................................................... 355
Access Control List (ACL) Section ............................................................................................................. 363
Access Control List (ACL) Commands .................................................................................................................................... 363
Security Section ............................................................................................................................................ 386
802.1X and Guest VLAN Commands ....................................................................................................................................... 386
Access Authentication Control Commands ............................................................................................................................... 404
IP-MAC-Port Binding (IMPB) Commands............................................................................................................................... 424
MAC-based Access Control Commands ................................................................................................................................... 442
Compound Authentication Commands ..................................................................................................................................... 454
SSH Commands ........................................................................................................................................................................ 460
SSL Commands ......................................................................................................................................................................... 467
Web-based Access Control Commands ..................................................................................................................................... 472
Network Application Section ...................................................................................................................... 481
DHCP Local Relay Commands ................................................................................................................................................. 481
DHCP Relay Commands ........................................................................................................................................................... 484
DHCP Server Commands .......................................................................................................................................................... 498
Object Access Method (OAM) Section ....................................................................................................... 511
CFM EXTENSION (ITU-T Y.1731) ......................................................................................................................................... 511
Connectivity Fault Management Commands ............................................................................................................................ 517
Ethernet OAM Commands ........................................................................................................................................................ 535
Monitoring Section....................................................................................................................................... 548
External Alarm Commands ....................................................................................................................................................... 548
Appendix Section ......................................................................................................................................... 550
Appendix A ............................................................................................................................................................................... 550
Mitigating ARP Spoofing Attacks Using Packet Content ACL .............................................................. 550
Appendix B ............................................................................................................................................................................... 556
Password Recovery Procedure ............................................................................................................... 556